First published: Wed Oct 20 2004(Updated: )
The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.2.2 | |
GNU glibc | =2.1.2 | |
GNU glibc | =2.0.5 | |
GNU glibc | =2.2.5 | |
GNU glibc | =2.0.6 | |
GNU glibc | =2.1.1 | |
GNU glibc | =2.0.3 | |
GNU glibc | =2.3.1 | |
GNU glibc | =2.3 | |
GNU glibc | =2.0 | |
GNU glibc | =2.1.1.6 | |
GNU glibc | =2.3.10 | |
GNU glibc | =2.1 | |
GNU glibc | =2.3.4 | |
GNU glibc | =2.1.9 | |
GNU glibc | =2.3.3 | |
GNU glibc | =2.0.1 | |
GNU glibc | =2.0.4 | |
GNU glibc | =2.0.2 | |
GNU glibc | =2.2.1 | |
GNU glibc | =2.3.2 | |
GNU glibc | =2.1.3.10 | |
GNU glibc | =2.2.3 | |
GNU glibc | =2.2.4 | |
GNU glibc | =2.1.3 | |
GNU glibc | =2.2 | |
Redhat Enterprise Linux Desktop | =3.0 | |
Redhat Enterprise Linux | =3.0 | |
Redhat Enterprise Linux | =3.0 | |
Redhat Enterprise Linux | =3.0 | |
ubuntu/glibc | <2.3.6-0ubuntu20 | 2.3.6-0ubuntu20 |
ubuntu/glibc | <2.3.6-0ubuntu20 | 2.3.6-0ubuntu20 |
ubuntu/glibc | <2.3.6-0ubuntu20 | 2.3.6-0ubuntu20 |
debian/glibc | 2.31-13+deb11u10 2.36-9+deb12u7 2.38-14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.